line data

Results 576 - 600 of 782Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
     SAS
By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
     Symantec
By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : it security, information ecosystems, data-centric security, identity management, security
     Qualys
By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability
     NetShelter - CyrusOne
By: Schneider Electric     Published Date: Jun 04, 2014
Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery.
Tags : schneider, electric, data, infrastructure, convert data, business value, it management, data management
     Schneider Electric
By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings
     WebEx Communications
By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication
     VeriSign, Inc.
By: SPSS Inc.     Published Date: Mar 31, 2009
In an intensely competitive marketplace, knowledge is power. The more an airline can learn about what its customers like and don't like about its offerings, the more effective it can be at building customer loyalty and maximizing its revenues.
Tags : spss, american airlines, customer loyalty, maximize revenues, roi, specialized market intelligence, production of information, increased productivity
     SPSS Inc.
By: Numara Software     Published Date: Jul 16, 2009
Delivering world class customer service in today’s fast paced business environment is becoming more difficult as information and data requires instant access.
Tags : footprints, numara, blackberry, mobile, service desk, on-the-go, slas, service level agreements
     Numara Software
By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
     Iovation
By: SAS     Published Date: Apr 13, 2011
This paper will outline the value and methods involved in data mining across both quantitative and qualitative data. In addition, it will describe the data transformations necessary before doing such work, and the tools that are particularly valuable for mining mixed data types.
Tags : business intelligence, michael lock, predictive analytics, business insight, business visibility, small to medium sized business
     SAS
By: SAS     Published Date: Mar 14, 2014
Master data management is not just something you install and fill with data. By transitioning from a consolidation approach to a data utilization approach, you will see how the disciplines and capabilities of master data management contribute to a long term information strategy that uses best practices to enable comprehensive information visibility.
Tags : sas, data management, consolidation approach, data utilization, information strategy, comprehensive information visibility, data center
     SAS
By: SAS     Published Date: Mar 14, 2014
This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.
Tags : sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
     SAS
By: SAS     Published Date: Mar 14, 2014
This paper will consider the relevance of measurement and monitoring – defining inspection routines, inserting them into the end-to-end application processing, and reporting the results.
Tags : sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
     SAS
By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data
     SAS
By: VMware     Published Date: Mar 08, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery
     VMware
By: Microsoft Corporation     Published Date: Oct 19, 2010
Get a close look at Microsoft security measures for ensuring data protection and integrity, and learn how you can rest assured about the security and reliability of Microsoft Online Services with 24x7 IT professional support and a financially backed service level agreement (SLA) for 99.9 percent uptime.
Tags : microsoft online services, security measure, data protection, business productivity, collaboration, it administration
     Microsoft Corporation
By: Microsoft Corporation     Published Date: Oct 19, 2010
Attend this webcast to see Microsoft Dynamics CRM Online in action, including integration to Microsoft Business Productivity Online Services (BPOS), and learn about customers who have used Microsoft Dynamics CRM Online.
Tags : microsoft dynamics crm online, marketing, roi, business productivity online services, bpos, data acquisition and segmentation, marketing analytics
     Microsoft Corporation
By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
     Quantum - Quinstreet
By: Apple Corporation     Published Date: Mar 26, 2014
Join Apple Business Experts for a exclusive on-demand online seminar to learn what’s new in iOS7 for business. Learn how iOS and an ever-expanding collection of features and built-in apps make iPhone and iPad even more powerful, innovative, and enjoyable to use for work. You will also see how iOS provides IT with powerful, yet simple ways to deploy and manage iOS devices, secure corporate data, and enable a great user experience. Register Now!
Tags : apple, ios7, iphone, ipad, business solutions, it solutions, it management, enterprise applications
     Apple Corporation
By: Qualtrics     Published Date: Mar 16, 2012
Information is power. The more information that we have, the better decisions we are able to make. This is true in business, academics, and science. We believe in making sophisticated research simple.
Tags : survey software, online survey software, market research, marketing research, customer satisfaction surveys, data collection, enterprise feedback management, voice of the customer
     Qualtrics
By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data
     Splunk
By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : complete, storage, data, protection, architecture, virtual, environments, virtualization
     Intel Corp.
By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : using, storeonce, ndmp, backup, symantec, netbackup, report, outlines
     Intel Corp.
By: VirtuStream     Published Date: Oct 18, 2012
As online ordering for Pizza Hut UK increases to over one million orders a week, Yum brands relies on Virtustream's data center to help take the load.
Tags : case study, data center, website traffic, servers
     VirtuStream
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com